Skip to main content

Home/ ITGS News/ Group items matching "productivity" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Mark Gakin

RFID Business Applications - 2 views

  •  
    RFID, radio frequency identification, is changing the ways companies and organizations operate. For the first time, they can create value in their products. In simpler terms, RFID is enabling companies to do so many different things they could not do before. It's important to know that RFID is used to identify people and objects. Each RFID tag has a tiny microchip within its body that can be recognized by a reader antenna. Even though this is bringing more business to companies because they have made it possible to shop much easier, it also is bringing them many issues because these antennas are permanently integrated into the tag, which can be tracked from anywhere. Given that the shopper purchased the item, the item can also be traced back to the shopper at any given time. Things like this can be dangerous in the real world because people's privacy becomes at stake. Either way, shopping is so much easier now thanks to RFIDs. The truth is, it's only a matter of time before they become a real problem.
T Graham

Credit Cards At Risk from High-Tech Pickpockets? - CBS News - 2 views

  •  
    In this article Walt Augustinowicz has shown and proved many people in the public how they can be pick pocketed with out a single finger being laid upon them. They can have their credit cards, debit cards, and passports information stolen quite easily with a simply passing by of the scanner. With this advanced technology that makes paying for things easier, also makes it easier for others to pay for their things using the same card. The card number, the expiration date, the type of card, and even the person's name can be found out. This can show how the social/ethical issue involved is thus privacy - security is another possible issue. The IT system is the RFID tags/microchips. The stakeholders are the people whose information is getting stolen and the people who are stealing the information - people who make the RFID tags/microchips are also possible stakeholders. The area of impact is politics and government - but also can be business and employment. People's private information is at stake and electronic pickpockets can easily steal the information and order products.
  •  
    This article talks about the security concerns related to RFID technology. RFID technology is susceptible to theft because it broadcasts radio frequencies about the information embedded in the card. This makes it very easy for thieves in possession of a card reader. A person with intent to steal information could just walk past a card carrier with a card reader and pick up the theft victim's credit card numbers, expiration dates and sometimes even the card owner's name. 20% of the card information that was stolen in an experiment has RFID chips. RFID technology increases the chance of identity theft, even passports have RFID implemented in them, this makes them very vulnerable. Passports carry very sensitive information and anyone with a RFID card scanner could wake pass a passport carrier and gain his or her personal information. The stakeholders in this issue include the card carrier or passport carrier whose security is endangered, the information thief who is gaining unauthorized access to a person's personal information and the businesses such as Visa or MasterCard whose reliability is being endangered. This is a security issue that has hampered the positive buzz surrounding RFID technology and its convenience.
Santiago P.

RFID: Protection, privacy and prevention - sourcefire, security, rsa, RFID, intermec - ARN - 1 views

  •  
    RFID is a very valuable and new technology, that promises to bring many advantages to the business world, which is the main area of impact being addressed. RFID is the IT being discussed. It permits people to gain access to goods, data on products, and important financial data. There is, however, the concern over the issue of security and privacy, which go hand in hand. Stakeholders in the issue are normal people, who increasingly are surrounded by RFID tags, especially in their credit cards. Tags can also be used to track a person's movement, which some claim is an invasion of privacy. Defenders claim that most RFID tags are incapable of being read or trasmit data from up to 50 cm. However, this does depend on the tag's antenna and the encryption it may or may not use to protect its data. There is the continual concern however, that RFID tags will handle more sensitive data as its capabilities improve. The fact that RFID tags store information on databases is also a concern for privacy advocates. An RFID tag uploads onto the database information on financial transactions, buying, selling, etc. The location, time, and other information is stored on a log in the database. The RFID is essentially tracking users' movement. The security concern, which is more consequential to users, is what is done when the database that contains all the sensitive information is hacked or damaged, and security is breached. Such concerns and these issues' impacts are obviously paramount when dealing with RFID tags and the issues of privacy and security.
Daniell S

The Pain of Change at Boeing - 0 views

  •  
    This article is about a book, and how it has ended the friendships between companies and employees. The article then goes into the topic of building a Boeing plane. A survey was sent out to the employees by the authors of this book to see if the company would make changes to its structure. However, many employees were laid off due to outsourcing. In the words of the article "Two aims of the outsourcing were to cut costs and to gain access to more foreign markets; both of those goals were largely achieved. " This shows that with outsourcing many people lost their jobs but the quality of the product was better than before. The 787Dreamliner had become much better with the technology used instead of the employees creating it. The employees were once treasured and considered themselves a family of sorts, but being replaced by Boeing they were obsolete and were easily expendable. The authors of the book say that anyone in top management should read this book and rethink their strategies for running the business. The book should also be read by the employees so they can work together to restore this idea of a family. The ethical issues in this idea of getting rid of workers so that better quality work can be done. By outsourcing jobs this allows the company to save more money than it would with having employees.
Ram Bhadra

Offshoring blamed in part for IT's jobless recovery - 2 views

  •  
    A very slow recovery is seen in the field of IT after the economic melt down however the bad economy is half the problem since another factor which has been growing since a very long time. It is offshoring of IT jobs from developed countries such as US and in Europe to countries such as China and India. It is also predicted that the IT jobs shall go down by 50% in the next four years in Europe and US.Also in this article the solely blames outsourcing for lack of jobs in developed countries and does not talk about how leads to growth in economies of developing nations which increases the consumption of goods manufactured in the developed countries and also leads to creation of new jobs. Hence this article has only one opinion. It does not talk about the growing opportunities for IT workers in countries besides the US and so on. It should focus on how offshoring had led to the ceasing of digital divides since individuals in developing nations now have economic power to consume similar products as Americans or Europeans and also the growing economies give the government chances to improve the infrastructure. Hence in the end it benefits all.
Mark Gakin

Outsourcing: Its Effects on the U.s Economy and Leadership - 0 views

  •  
    This article is about how companies use outsourcing and offshoring as a way to reduce costs and as a method for cheap labor. One of the articles' main points about outsourcing is that the decision to outsource is often in the interest of the company to reduce costs, divert or energy-saving measures aimed at making the skills of a particular company or for the more efficient use of labor, capital, technologies and resources. One problem that arises from outsourcing is that it takes much-needed jobs from the U.S. economy. It is not too different from offshoring, because both are beneficial for companies and used to cut costs. When a company chooses to offshore, it means that it does its business in another country. This 'other' country is usually a developing country because rates tend to be much cheaper there, which is exactly how businesses save money. One of the main issues, again, lies within the U.S. economy. Since US businesses are leaving to do business in other countries, the US economy is suffering quite a blow because less companies are becoming dependent on it. This is a big problem and could lead to an even bigger one for the business because third world countries cannot always be trusted. Even though they are saving so much more money by offshoring, the business they now perform is unreliable and could possibly be affected my many more problems. The main stakeholders in this issue are the businesses who are offshoring and outsourcing, the US government, and the countries the businesses now rely on. Also, depending on the company, people in America tend to suffer as well because since the main issue that arises is reliability, the users or owners of the product may not have the same service. For example, if Time Warner decides to station in India, the workers there may be inexperienced and the company will not be able to do anything about it. This means that when the users of Time Warner call their main number, someone in India will pick up. The probl
Olivia M

India Outsourcing Companies Ramp Up Hiring As US Demand Grows - 1 views

  •  
    In this article, the author talks about how companies are relying on outsourcing to hire employees. Its odd because the companies think it is better for US mainly because they are able to keep their workers and not that they are able to provide Americans with cheaper service. It also made me realize the small percentage that Americans make up of the workforce. This means that there is huge competition between American and Indian workers because they are both competing for the same jobs. But Indian workers have an advantage because they have lower wages. Companies want to choose Indians because they get to save money even though its putting Americans out of work. This is a disadvantage because then Americans won't have money to pay for the services or products.
Rubayeth M

Data Security Is No Long an Option - 0 views

  •  
    - In this article, "Data Security Is No Longer an Option," written by Eve Tahmincioglu is stating that the issues that concern Groogle. Groogle is a company which is a small online travel site that can supply the same to others from this site. (Scott Larsen, IT Director for the company, Groogle.) Jon Clay (product marketing manager for Trend Micro) will help get Tokyo based security software that will help this small business result in to a faster growing business. They will require a set of requirements that will be met by 95%. The upgrades made by the security measures have increased sales. Looking on from other companies, they have seen what is known as the virtual private network which sends encrypted data one location to the other without others looking at it. This is possible because of the firewalls and he spyware filtering programs that help keep out unknown individuals. At the end they came down to a decision that says they will upgrade to an intrusion detecting system that will cost around $25,000 to $125,000. Even though they will be enhancing their system there will be one problem which is the idea of making the computer adapt to the changes.
Daniell S

Data Security Is No Longer an Option - 0 views

  •  
    This article starts off with the actions of a small travel site. This article speaks of the price they had to pay to upgrade the security. This company has to make big changes to their security in order to do business with larger companies. In this situation there are both positive and negative impacts. One big negative impact is the price to pay for this upgrade in security. In order to be on par with the security of higher level businesses smaller businesses have to pay large amounts of money to gain this security. This would require a lot of faith in the big businesses from the smaller business. As said in the article "The connection, and everything transmitted over it - financial, customer and product data - has to be secure and out of the reach of hackers, cyber thieves and even disgruntled employees." This shows how secure the website has to be. This is so that bigger companies can trust the smaller companies to handle business. However, through this impact can come a positive one. By having security equal to those of bigger businesses customers will have an easier time trusting the company. Another issue that comes up is reliability. A question that can be asked is whether or not the security is strong enough against hackers? This would give customers right to question whether or not this website would be trustworthy or not. In this situation the important stakeholders would be the bigger businesses and the smaller businesses. In order to do business both companies need to have the same level security. This would require one or both companies to upgrade their systems greatly to be on par with each other. Another important stakeholder would be the customer. The customer would need to know whether or not they could use the website without worrying too much about being hacked. If the customer knew the security was stable it would make them more comfortable about using it.
T Graham

PIA Information Services - Philippine Information Agency - 0 views

  • SM, NOKIA partner for cellphone waste collection
    • T Graham
       
      This is an interesting topic because the actual cell phone providers are helping to recycle their own products. Usually it's a private group or organization.
  • promote promise of electronic recycling.
    • T Graham
       
      Promotion is the key because it educates large numbers of people, making it easier to enforce the movement. Promotion from large companies makes it eaiser to reach the stakeholders.
  • She said this activity is in support to the earlier tie up of SM Supermalls where collaboration was made with concerned institutions and entities last September 2007
    • T Graham
       
      With the large coporations and the concerned private groups joining together they will make a bigger difference. The coporations can easily pitch recycling ideas to their costumers and the organizations will provide information and ideas.
  • ...2 more annotations...
  • "This we can say that SM is no longer just a business enterprise but is a partner in helping the environment," she added.
    • T Graham
       
      This is where business and environment fuse together, to create an extremely helpful supercause. The business is not just making money its making money and saving the environment.
  • As we use, lose, abuse, and eventually upgrade our electronic tools we are leaving behind a massive transistor-filled leftover known as e-Waste. Thousands of mobile phones and all its accessories goes along with other e-Waste
    • T Graham
       
      E-waste can affect our water, air and soil. The waste that comes from cell phones can also takes hndreds of years to completely disentegrate.
Madeline Brownstone

What is a Standard - 0 views

  • Nomenclature is challenging because "technical specification" has different meanings in different areas of the world.  For example, a technical specification in CEN is a lower grade, less permanent deliverable likely to be revised.  A standard, on the other hand, is intended to be stable and products shall conform to the requirements.
    • Madeline Brownstone
       
      Standard is more stable than a technical specification.
  • to limit how a specific technology will be used to carry or represent the data.
  • GS1’s Global Trade Identification Number (GTIN) is an example of a high-level application standard that is completely independent of a technical specification because it can be applied regardless of whether bar code, RFID or even human-readable characters are used to represent it.
    • Madeline Brownstone
       
      GTIN standard is independent--can be used with bar code, RFID or human-readable characters
  •  
    Technology Standards vs Application Standard
Madeline Brownstone

BBC NEWS | Business | Twitter 'costs businesses £1.4bn' - 1 views

  • Staff who use Twitter and other social networking sites while at work are costing UK businesses £1.38bn every year, a report has said.
  • Although many businesses have banned the use of Facebook in the workplace
    • Madeline Brownstone
       
      I infer that Facebook bans can be enforced through proxy server settings.
  • Over three-quarters of respondents said that their employer had not issued them with specific guidelines with regards to using Twitter. "Without guidelines and usage polices businesses are leaving themselves wide open to a reduction in productivity, brand damage and security risks," Morse said.
    • Madeline Brownstone
       
      If company policies need to specify this site or that site, they will drive themselves crazy with writing and rewriting regulations. It is just not a practical solution.
  • ...1 more annotation...
  • It added that companies should think about protecting the reputation of their brand. A third of workers admitted they had seen sensitive information posted on social networks. However, 84% said they felt it should be up to them what they posted online
    • Madeline Brownstone
       
      a secondary issue is inferred here. The author implies that there are some workers who revealy company business through social networking sites and that is potentially harmful for the company's reputation. A twist here: the company wants privacy!
  •  
    Seem like this has potential as a lead article.
‹ Previous 21 - 34 of 34
Showing 20 items per page